Endpoint Security , Next-Generation Technologies & Secure Development , Threat Hunting

How to Mature Your Threat Hunting Program

Best practices on using the ATT&CK framework to develop your threat hunting capabilities.

Every threat hunt starts with intelligence. As one of the industry's most comprehensive knowledge bases for adversary behavior, ATT&CK provides a structure for hunters to build their hypotheses and search for threats.

Hit play on the video above and learn how to use ATT&CK to:

  • Increase the efficacy of your threat hunting program;
  • Hunt for adversary tactics and techniques across the ATT&CK matrix;
  • Develop a hypothesis and test it against known techniques;
  • Obtain a broader set of evidence by hunting for adversarial techniques rather than specific signatures.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.